AWS

Safeguard a generative AI travel agent with prompt engi...

In this post, we explore a comprehensive solution for addressing the challenges ...

Improving air quality with generative AI

This post presents a solution that uses a generative artificial intelligence (AI...

Use zero-shot large language models on Amazon Bedrock f...

Name entity recognition (NER) is the process of extracting information of intere...

How Twilio used Amazon SageMaker MLOps pipelines with P...

This post is co-written with Shamik Ray, Srivyshnav K S, Jagmohan Dhiman and Sou...

Accelerate deep learning training and simplify orchestr...

In large language model (LLM) training, effective orchestration and compute reso...

Scalable intelligent document processing using Amazon B...

In today’s data-driven business landscape, the ability to efficiently extract an...

Build a custom UI for Amazon Q Business

Amazon Q is a new generative artificial intelligence (AI)-powered assistant desi...

Use weather data to improve forecasts with Amazon SageM...

Photo by Zbynek Burival on Unsplash Time series forecasting is a specific machin...

Reimagining software development with the Amazon Q Deve...

Amazon Q Developer uses generative artificial intelligence (AI) to deliver state...

How Wiz is empowering organizations to remediate securi...

Wiz is a cloud security platform that enables organizations to secure everything...

Sprinklr improves performance by 20% and reduces cost b...

This is a guest post co-written with Ratnesh Jamidar and Vinayak Trivedi from Sp...

Get started quickly with AWS Trainium and AWS Inferenti...

Starting with the AWS Neuron 2.18 release, you can now launch Neuron DLAMIs (AWS...

Code generation using Code Llama 70B and Mixtral 8x7B o...

In the ever-evolving landscape of machine learning and artificial intelligence (...

Build RAG applications using Jina Embeddings v2 on Amaz...

Today, we are excited to announce that the Jina Embeddings v2 model, developed b...

Detect email phishing attempts using Amazon Comprehend

Phishing is the process of attempting to acquire sensitive information such as u...

How Skyflow creates technical content in days using Ama...

This guest post is co-written with Manny Silva, Head of Documentation at Skyflow...

浮动元件示例